Abstract
With the development of information technology, the issue of trust becomes more and more important. In e-commerce or service-oriented environments, when there are a few sellers or service providers providing the same product/service, the buyer or service client would like to request the trust management authority to provide trust values of sellers or service providers, which are based on the ratings reflecting the quality of previous transactions. In addition, trust is context dependent, i.e. for different context of transactions, there are different factors influencing the trust result. In this paper, we propose a fuzzy comprehensive evaluation based method for building up a projection from the trust ratings in the transaction history of a service provider to an upcoming transaction depending on the similarity between previous transactions and the upcoming one, and the familiarity between each rater and the service client of the upcoming transaction. This process is termed as context based trust normalization. After trust normalization, normalized trust ratings are used for trust evaluation, the results of which would be closely bound to the upcoming transaction. Finally, we introduce the results of our conducted experiments to illustrate how our proposed method can detect some typical risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adler, P.S.: Market, hierarchy, and trust: The knowledge economy and the future of capitalism. Organization Science 12(2), 215–234 (2001)
Ashri, R., Ramchurn, S.D., Sabater, J., Luck, M., Jennings, N.R.: Trust evaluation through relationship analysis. In: AAMAS 2005, pp. 1005–1011 (2005)
Azar, A.T.: Fuzzy Systems. Intech (2010)
Castelfranchi, C., Falcone, R.: Trust is much more than subjective probability: Mental components and sources of trust. In: HICSS 2000 (2000)
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: ACM Conference on Computer and Communications Security (CCS 2002), pp. 207–216 (2002)
Feng, S., Xu, L.D.: Decision support for fuzzy comprehensive evaluation of urban development. Fuzzy Sets and Systems 105(1), 1–12 (1999)
Griffiths, N.: Task delegation using experience-based multi-dimensional trust. In: AAMAS 2005, pp. 489–496 (2005)
Hamada, M.S., Wilson, A.G., Reese, C.S., Martz, H.F.: Bayesian Reliability. Springer, Heidelberg (2008)
Hójek, A.: Probability, Logic, and Probability Logic. The Blackwell Guide to Philosophical Logic, pp. 362–384. Blackwell Publishing, Malden (2001)
Jeffrey, R.: Subjective Probability: The Real Thing. Cambridge University Press, Cambridge (April 2004)
Jøsang, A.: Subjective evidential reasoning. In: IPMU (2002)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW 2003, pp. 640–651 (2003)
Li, L., Wang, Y.: A trust vector approach to service-oriented applications. In: ICWS 2008, pp. 270–277 (2008)
Li, L., Wang, Y.: Subjective trust inference in composite services. In: AAAI 2010, pp. 1377–1384 (2010)
Li, L., Wang, Y., Lim, E.-P.: Trust-oriented composite service selection and discovery. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol. 5900, pp. 50–67. Springer, Heidelberg (2009)
Li, L., Wang, Y., Varadharajan, V.: Fuzzy regression based trust prediction in service-oriented applications. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol. 5586, pp. 221–235. Springer, Heidelberg (2009)
Liu, G., Wang, Y., Orgun, M.A.: Optimal social trust path selection in complex social networks. In: AAAI 2010, pp. 1391–1398 (2010)
Marti, S., Garcia-Molina, H.: Limited reputation sharing in p2p systems. In: ACM EC 2004, pp. 91–101 (2004)
Papazoglou, M.P., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: a research roadmap. Int. J. Cooperative Inf. Syst. 17(2), 223–255 (2008)
Ponzetto, S.P., Navigli, R.: Large-scale taxonomy mapping for restructuring and integrating wikipedia. In: IJCAI 2009, pp. 2083–2088 (2009)
Ponzetto, S.P., Strube, M.: Deriving a large-scale taxonomy from wikipedia. In: AAAI 2007, pp. 1440–1445 (2007)
Sabater, J., Sierra, C.: REGRET: reputation in gregarious societies. In: Agents 2001, pp. 194–195 (2001)
Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6), 24–34 (2005)
Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: Arnetminer: extraction and mining of academic social networks. In: KDD 2008, pp. 990–998 (2008)
Vu, L.-H., Hauswirth, M., Aberer, K.: QoS-based service selection and ranking with trust and reputation management. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3760, pp. 466–483. Springer, Heidelberg (2005)
Wang, Y., Lim, E.-P.: The evaluation of situational transaction trust in e-service environments. In: ICEBE 2008, pp. 265–272 (2008)
Wang, Y., Lin, K.-J.: Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Computing 12(4), 55–59 (2008)
Wang, Y., Singh, M.P.: Formal trust model for multiagent systems. In: Proceedings 20th International Joint Conference on Artificial Intelligence (IJCAI 2007), pp. 1551–1556 (2007)
Wang, Y., Varadharajan, V.: Trust2: Developing trust in peer-to-peer environments. In: IEEE SCC 2005, pp. 24–34 (2005)
Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843–857 (2004)
Yu, B., Singh, M.P., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: 2004 IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1–10 (2004)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.D.: Sybilguard: defending against sybil attacks via social networks. IEEE/ACM Trans. Netw. 16(3), 576–589 (2008)
Yu, H., Shi, C., Kaminsky, M., Gibbons, P.B., Xiao, F.: Dsybil: Optimal sybil-resistance for recommendation systems. In: IEEE Symposium on Security and Privacy, pp. 283–298 (2009)
Zacharia, G., Maes, P.: Trust management through reputation mechanisms. Applied Artificial Intelligence 14(9), 881–907 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, L., Wang, Y. (2010). Context Based Trust Normalization in Service-Oriented Environments. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-16576-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16575-7
Online ISBN: 978-3-642-16576-4
eBook Packages: Computer ScienceComputer Science (R0)